- Hands-On Application Penetration Testing with Burp Suite
- Carlos A. Lozano Dhruv Shah Riyaz Ahemed Walikar
- 166字
- 2021-07-02 12:16:38
Planning and reconnaissance
In the planning and reconnaissance phase, we define the scope of the penetration test. This initial phase requires a lot of planning, and you need to answer questions, such as:
- What is the scope of the pentest?
- What are the restricted URLs?
- What are the various subdomains in scope?
- Are there multiple applications hosted on the same domain in different folders?
- Are there any other platforms where this application is hosted (that is, mobile applications, web applications, desktop applications, and so on)
Once you have answered these questions, you will get some clarity on what is to be tested and what's not. Depending on whether it is a black box or a white box test, further enumeration takes places. In either of the cases, we will have to go ahead and discover all the files and folders of the application in scope and identify the endpoints. Later, in the next chapter, we will see how to discover new files and folders using Burp.
推薦閱讀
- Node Security
- DevSecOps敏捷安全
- 數(shù)據(jù)安全實(shí)踐指南
- .NET安全攻防指南(上冊(cè))
- Spring Security(Third Edition)
- 解密彩虹團(tuán)隊(duì)非凡實(shí)戰(zhàn)能力:企業(yè)安全體系建設(shè)(共5冊(cè))
- 網(wǎng)絡(luò)安全能力成熟度模型:原理與實(shí)踐
- 軟件安全保障體系架構(gòu)
- Instant Java Password and Authentication Security
- CTF那些事兒
- 數(shù)據(jù)保護(hù):工作負(fù)載的可恢復(fù)性
- 網(wǎng)絡(luò)用戶行為的安全可信分析與控制
- 網(wǎng)絡(luò)服務(wù)安全與監(jiān)控
- 聯(lián)邦學(xué)習(xí)原理與算法
- 大數(shù)據(jù)安全治理與防范:反欺詐體系建設(shè)